Sciweavers

1463 search results - page 162 / 293
» Securing Wireless Mesh Networks
Sort
View
FTNET
2007
80views more  FTNET 2007»
13 years 10 months ago
Network Coding Applications
Network coding is an elegant and novel technique introduced at the turn of the millennium to improve network throughput and performance. It is expected to be a critical technology...
Christina Fragouli, Emina Soljanin
ICMCS
2006
IEEE
121views Multimedia» more  ICMCS 2006»
14 years 4 months ago
Packet Loss Modeling for Perceptually Optimized 3D Transmission
Transmissions over wireless and other unreliable networks can lead to packet loss. An area that has received limited research attention is how to tailor multimedia information tak...
Irene Cheng, Lihang Ying, Anup Basu
CORR
2010
Springer
132views Education» more  CORR 2010»
13 years 8 months ago
New Frontiers of Network Security: The Threat Within
Nearly 70% of information security threats originate from inside the organization. The instances of insider threats have been increasing at an alarming rate with the latest trends ...
Sugata Sanyal, Ajit Shelat, Amit Gupta
PERCOM
2007
ACM
14 years 10 months ago
A three round authenticated group key agreement protocol for ad hoc networks
Group Key Agreement (GKA) protocols enable the participants to derive a key based on each one's contribution over a public network without any central authority. They also pr...
Daniel Augot, Raghav Bhaskar, Valérie Issarny, Da...
AINA
2007
IEEE
14 years 4 months ago
Using Social Network Theory Towards Development of Wireless Ad Hoc Network Trust
The evolution and existence of stable trust relations have been studied extensively in the context of social theory. However, reputation systems or trust schemes have only been re...
Sameer Pai, Tanya Roosta, Stephen B. Wicker, Shank...